Optimized security operations

An analyst-centric user experience offers increased flexibility, customization, and faster response to investigations. Analysts with any level of experience, from beginner to expert, will find it easier to prioritize, investigate, and respond to evolving threats.

McAfee Connect

System requirements

McAfee Enterprise Security Manager (ESM) can be deployed with physical and virtual appliances. It can also be part of an all-in-one SIEM deployment that includes McAfee Enterprise Log Manager (ELM) and McAfee Event Receiver (ERC). McAfee SIEM appliance specifications and descriptions are provided for information only, subject to change without notice, and provided without warranty of any kind, expressed or implied.

Cloud

Model Number

Deployment

Local Storage1

CPU Cores

System Requirements

ESM-ELM-ERC-VM2

AWS, Azure, HyperV, ESX, KVM, XEN

Recommended 250 GB

8

8 Processor Cores, 16 GB RAM

ESM-VM

AWS, Azure, HyperV, ESX, KVM, XEN

Recommended 250 GB

8

8 Processor Cores, 16 GB RAM

ESM-VM-4-CORE-ADDON

AWS, Azure, HyperV, ESX, KVM, XEN

See footnote 3

See footnote 4

Per 4 Core Add-on, 16 GB RAM

Appliances

Model Number

Appliance Size

Local Storage1

CPU Cores

ESM-ELM-ERC-57002

2U

32 TB + 800 GB SSD

20

ESM-ELM-ERC-60502

2U

40 TB + 800 GB SSD

28

ESM-5700

2U

32 TB + 800 GB SSD

20

ESM-6050

2U

40 TB + 800 GB SSD

28

ESM-X7

2U

16 TB SSD + 2 TB SSD (PCle)

20

ESM-X9

2U

19 TB SSD + 8 TB SSD (PCle)

28

ESM-X11

2U

19 TB SSD + 8 TB SSD (PCle)

36

1Usable event and flow data storage capacity will vary by customer event types, event rates, software version, and other factors.2All-in-one SIEM offering that includes Enterprise Security Manager, Enterprise Log Manager, and Event Receiver.3Space should be calculated based on the customer retention requirements. It is recommended that VMs have dedicated SSD storage to reach higher ingestion and query performance.4Option to expand ESM-VM in 4-core increments up to 32-core maximum.

This guide breaks down how AI functions, the strengths and limitations of various types of machine learning, and its evolution. It also explores how AI-enabled security analytics can help protect enterprises from today’s complex cybersecurity threats.